Q.1
On which port will the server generally listen to for SMTP?
  • a) port 35
  • b) port 63
  • c) port 25
  • d) port 65
Q.2
In the alert protocol the first byte takes the value 1 or 2 which corresponds to ________ and _________ respectively.
  • a) Select, Alarm
  • b) Alert, Alarm
  • c) Warning, Alarm
  • d) Warning, Fatal
Q.3
In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
  • a) True
  • b) False
Q.4
In the SSL record protocol operation pad_1 is :
  • a) is the byte 0x36 repeated 40 times for MD5
  • b) is the byte 0x5C repeated 40 times for MD5
  • c) is the byte 0x5C repeated 48 times for SHA-1
  • d) is the byte 0x36 repeated 48 times for MD5
Q.5
In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
  • a) Fortezza
  • b) Anonymous Diffie-Hellman
  • c) Fixed Diffie-Hellman
  • d) RSA
Q.6
Which key exchange technique is not supported by SSLv3?
  • a) Anonymous Diffie-Hellman
  • b) Fixed Diffie-Hellman
  • c) RSA
  • d) Fortezza
Q.7
An HTTP connection uses port __________ whereas HTTPS uses port __________ and invokes SSL.
  • a) 40; 80
  • b) 60; 620
  • c) 80; 443
  • d) 620; 80
Q.8
SSID stands for
  • a) Secure Service Identifier
  • b) Secure Set Independent Device
  • c) Secure Set Identifier
  • d) Service Set Independent Device
Q.9
“When an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network previleges.” Which type of Wireless network threat would you classify this under?
  • a) Identity Theft
  • b) Man in the middle attack
  • c) Network Injection
  • d) Accidental Association
Q.10
Loopback address is given by:
  • a) 0.0.0.0
  • b) 127.x.x.x
  • c) 255.255.255.255
  • d) None of the mentioned
0 h : 0 m : 1 s